As we are aware, cPanel has introduced the latest stable version cPanel 11.50. Many new features are implemented in the latest version, which includes but are not limited to :. Support for CentOS 7 on fresh installations Synchronized Calendar & Contacts Greylisting: Protect your server against spam, Greylisting defers email received from new, unknown triplets Passive OS fingerprinting (p0f): Improved the GeoIP identifier and added an operating system and other information to email notifications. This information helps you quickly identify users that trigger events. Changes to new cPanel user system …
Miscellaneous
VENOM vulnerability also known as QEMU exploit is the most recent vulnerability reported on May 13, 2015 and it is discovered by Jason Geffner while performing a security review of virtual machine hypervisors. VENOM stands for “Virtualized Environment Neglected Operations Manipulation”. This venom exploits QEMU, an open source machine emulator. The venom CVE-2015-3456 vulnerability resides in the virtual floppy drive code (FDC) used by the virtualization platforms. If it gets exploited, it allows an attacker to gain full control of the operating system hosting them and as well as on …
Round Robin is a balancing mechanism used by the DNS servers which are usually used for sharing the network load and managing the load of geographically distributed Web servers. The DNS server that uses the round-robin mechanism will provide alternates for each client request. Concept:- Suppose, you have a domain name and three identical home pages hosted on three servers with three different IP addresses. By using Round Robin DNS, when one user accesses the home page, the request will be sent to the first IP address. The second user who …
PHP: Hypertext Preprocessor has been involving in all of its dynamics in the recent years. In recent times it has involved included and engulfed many of the recent development and api that has been introduced to the computer world especially web developing. Switching to higher version of PHP is always good but before proceeding the switch we recommend to test the code in the new version and be well satisfied on the code execution. In this doc we will be taking an overlook on the changes and precaution one should …
ZPanel is a free and complete web hosting control panel for Microsoft Windows and POSIX (Linux, UNIX and MacOSX) based servers. ZPanel is written in PHP and uses several open-source (or freely available) software packages to provide a secure, web hosting system. ZPanel flawlessly integrates with MySQL, hMailServer (on Windows), Posfix (on Linux etc.) and Filezilla (on Windows) or ProFTPd (on Linux etc.). Installation can be completed with following steps : # wget https://raw.github.com/zpanel/installers/master/install/CentOS-6_4/10_1_1.sh # chmod +x 10_1_1.sh # ./10_1_1.sh # You can then follow the configurations needed from the …
Today many tools are available for performing Server Administration. In this article, let’s have a check with a few of the top Server Administration tools. 1.TightVNC TightVNC is a remote desktop software application and it can be used to connect to another computer and display its live remote desktop. Like other VNC systems, it consists of two parts: the “Server”, which shares the screen of the machine it’s running on, and the “Viewer”, which shows the remote screen received from the server TightVNC Server is designed to run in two …
IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system. Its a phenomena in which attackers changes or replicate a IP packets. In order to dig deep lets understand some basic concepts. In internet the connection between two computer takes place using TCP/IP protocol. In which data needed to send from one computer to another is broken down into pieces known as packets. These packets are …
Some scripts/applications require certain scripts be run at a certain time to function properly. On Windows servers, we can set them up to run at certain times by creating a scheduled task (which is similar to how you can run cron jobs on Linux servers). Creating a Scheduled Task in Plesk: We can set up Scheduled Tasks in Plesk by doing the following: Log into Plesk The user you are logging in with should have enough permissions to create a scheduled task. Windows Shared customers automatically have permission, and the …
SSH tunneling is used to tunnel all of the traffic from your local machine to a remote server that you have an account. SSH allows users to create TCP tunnels to send data over the network. The amazing thing about SSH tunnels is that they are encrypted. How tunneling works? This works by allocating a socket to listen to port on the local side, optionally bound to the specified bind_address. Whenever a connection is made to this port, the connection is forwarded over the secure channel, and a connection is …
Logstalgia is a visualization tool that visualize web access logs as a game simulation (as a pong like battle game between web server and requests). Requests are appeared as colored balls and travel across the screen to reach requested location. The colored ball hits the paddle if it is a successful request otherwise it misses (for e.g. if it is an error) Requirements: > Its works with OpenGL (Open graphic Library) and need an accelerated 3D display to visualize > A web server with logs such as Apache, Lighttpd, Nginx …